Chapter 17 Computer Crime Hess 17-1. Introduction Computer crimes are relatively easy to commit and difficult to detect Most computer crimes are not prosecuted.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
2 Language of Computer Crime Investigation
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Guide to Computer Forensics and Investigations, Second Edition
Computer Forensics Principles and Practices
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Identification and Analysis of Cyber Crime (Repository of Cyber Crime and Cyber Laws) Knowledge Based System (KBS) Presentation By : Dr. Priyanka Sharma.
By Drudeisha Madhub Data Protection Commissioner Date:
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
The Investigative Process The responsibility of all who work within the field of criminal justice, both public and private investigators.
Guide to Computer Forensics and Investigations, Second Edition
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Cybersecurity Governance in Ethiopia
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Forensics Principles and Practices
Evidence Preservation and Sampling
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
INTRODUCTION TO FORENSICS Let’s get started!. What is forensics? The application of science to law.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
STANKIEWICZ. Essential Questions and Learning What is the purpose of criminal Investigation? What are the basic steps in criminal investigations? What.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Crime Scene Investigation. Basic Premise The actions taken at the onset of an investigation are vitally important to the successful resolution of the.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Criminal Investigation: An Overview
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
_______________________________________________________________________________________________________________ ____________ Successfully Investigating.
Cybercrime What is it, what does it cost, & how is it regulated?
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
2- PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ CRIMINALISTICS An Introduction to Forensic Science, 9/E By Richard Saferstein.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
SEARCH, The National Consortium for Justice Information and Statistics Melissa Nee Government Affairs Specialist SEARCH Overview Briefing.
BCCO PCT #4 PowerPoint INTERMEDIATE CRIME SCENE SEARCH TCOLE Course # to 40 hours AND UNIT THREE.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cooperating with Internet Service Providers OSCE, Vienna, 24 th October 2008.
Cell Phone Forensics Investigator - ICFECI
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Prof. Dr. Lorena Bachmaier, Universidad Complutense Madrid, Spain Section III- Criminal Procedure Information Society and Penal Law Lorena Bachmaier Doha,
Chapter 1 Criminal Investigation: An Overview
CJ in the USA: Copyright 2011 Curriculum Technology, LLC. All Rights Reserved.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Unit 3: Impression Evidence tool marks
Criminal Evidence Chapter 3
Chapter 7: Investigating Theft Acts
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Crime scene investigation
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Computer Forensics 1 1.
Introduction The Regional Computer Forensics Laboratory (RCFL) National Program Office created this toolkit to help law enforcement executives assess.
Investigative Applications 29.6
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Forensic Science The Crime Scene.
U.S. Department of Justice
CRIME SCENE PROCESSING
Computers: Tools for an Information Age
Ad Hoc Phase Structured Phase Enterprise Phase
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Chapter 16 Tool Marks By the end of this chapter you will be able to:
The Crime Scene.
Science of Crime Scenes
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Presentation transcript:

Chapter 17 Computer Crime Hess 17-1

Introduction Computer crimes are relatively easy to commit and difficult to detect Most computer crimes are not prosecuted Crimes involving computers have become much more sophisticated Most computers on the planet are connected via the Internet A new breed of detective—the cybercrime investigator Hess 17-2

SOURCES IC Internet Crime Report 2010 CyberSecurity Watch Survey 2010/2011 CSI Computer Crime and Security Survey Created a fundamental change in law enforcement agencies Hess 17-3 The Scope and Cost of the Problem

COMMON TERMS Cybercrime Cybertechnology Cyberspace E-crime Hess 17-4 Terminology and Definitions

THE NET VERSUS THE WEB Net is a network of networks Web is an abstract space of information LIVE CHAT AND INSTANT MESSAGING Two or more people Talk online in real time Hess 17-5 Terminology and Definitions

OVERVIEW Computer as target Computer as tool Computer as incidental to an offense Be aware of the ever-expanding ways Hess 17-6 Classification and Types of Computer Crimes

COMPUTER AS TARGET Viruses and worms Invariably involves hacking COMPUTER AS TOOL Traditional methods elevated Many offenses overlap Hess 17-7 Classification and Types of Computer Crimes

OVERVIEW Reluctance or failure to report crime Lack of training Need for specialists Fragility of the evidence Jurisdictional issues Hess 17-8 Special Challenges in Investigation

NONREPORTING OF COMPUTER CRIMES Did not think law enforcement could help Too insignificant to report LACK OF INVESTIGATOR TRAINING Cybercriminals are more technologically sophisticated Law enforcement needs additional training Hess 17-9 Special Challenges in Investigation

NEED FOR SPECIALISTS AND TEAMWORK Cybercrime unit FRAGILITY AND SENSITIVITY OF EVIDENCE Computer evidence is very fragile Can be altered or damaged easily Could be rendered unusable Hess Special Challenges in Investigation

JURISDICTIONAL ISSUES Traditional boundaries are complicated Double criminality Need for unified global approach Federal versus state Growing pains for this area of law Hess Special Challenges in Investigation

COMMON PROTOCOL Secure, evaluate and document crime scene Obtain a search warrant Recognize, identify, collect and preserve the evidence Package, transport and store evidence Submit digital evidence Document in an incident report Hess The Preliminary Investigation

SECURING AND EVALUATING THE SCENE Basic ON/OFF tenet Follow departmental policy Ensure that no unauthorized person has access Ensure condition of electronic device is not altered Properly document Hess The Preliminary Investigation

OBTAINING A SEARCH WARRANT Searches may be conducted by consent Suspect unknown, warrant must be obtained Have both a consent search form and a search warrant Avoid destruction of evidence Hess The Preliminary Investigation

RECOGNIZING EVIDENCE Conventional  Fingerprints  Documents  Hard drive Digital  Electronic files  s Hess The Preliminary Investigation

DOCUMENTING DIGITAL EVIDENCE Thorough notes, sketches and photographs Document condition and location of computer system Photograph the entire scene Photograph the front and back of the computer Hess The Preliminary Investigation

COLLECTING PHYSICAL AND DIGITAL EVIDENCE Evidence often contained on disks Devices may have fingerprints Avoid contact with recording surfaces Evidence log Chain of custody issues Hess The Preliminary Investigation

PACKAGING, TRANSPORTING AND STORING DIGITAL EVIDENCE Keep away from magnetic fields Store away from humidity extremes Do not use plastic bags Be aware of battery needs Hess The Preliminary Investigation

DATA ANALYSIS AND RECOVERY Deleted files remain on hard drive Forensic expert can make viewable Recycle bin Data remanence Hess Forensic Examination of Computer Evidence

WARRANT EXCEPTIONS Contraband, fruits or instrumentalities of the crime Prevent death or serious bodily injury Has committed or is committing a criminal offense to which the materials relate Hess Legal Considerations in Collecting and Analyzing Computer Evidence

DEVELOPING SUSPECTS Most cybercrimes committed by outsiders Three categories  Crackers  Vandals  Criminals Hess Follow-Up Investigation

ORGANIZED CYBERCRIME GROUPS Generally not loyal to one another Operate in countries with weak hacking laws UNDERCOVER INVESTIGATION AND SURVEILLANCE Headed by computer expert Online undercover officer Hess Follow-Up Investigation

VULNERABILITY Access via phone lines Critical nature of law enforcement data Agency’s network should be a top priority Evidence logs Other valuable data Hess Security of the Police Department’s Computers

GOVERNMENT MEASURES USA PATRIOT Act Foreign Intelligence Surveillance Act (FISA) National Security Letter (NSL) Child Protection and Sexual Predator Punishment Act All states have enacted tough computer crime control laws Hess Legislation

CYBER SPECIALISTS Often requires a team approach Equipment owner Database technicians Auditors Computer experts Programmers Hess The Investigative Team

SOURCES National Cybercrime Training Partnership (NCTP) Electronic Crimes Task Forces (ECTFs) Perverted Justice NetSmartz Hess Resources Available

STRATEGIES Educating top management Educating employees Instituting internal security precautions Management  Commitment to defend against computer crime  Organization-wide policies Hess Preventing Computer Crime

Summary Computer crimes are relatively easy to commit and difficult to detect Basic tenet for first responders at computer crime scenes is to observe the ON/OFF rule Most cybercrimes against businesses are committed by outsiders Investigating such crimes often requires a team approach Hess 17-28